25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Microsoft & Ivanti Patch Multiple Critical and Actively Exploited Flaws

Microsoft issued patches to fix 79 vulnerabilities on September 2024 Patch Tuesday, including 3 actively exploited vulnerabilities and one that Microsoft considers to be exploited. This month’s updates include fixes for 7 critical flaws, 71 important flaws, and 1 moderate-severity flaw.

The actively exploited vulnerabilities affect Windows and Microsoft Publisher

CVE-2024-38014 – Windows Installer, Elevation of Privilege – CVSS 7.8

An actively exploited flaw that allows a threat actor to gain SYSTEM privileges on Windows systems.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

CVE-2024-38226 – Microsoft Publisher, Security Feature Bypass – CVSS 7.3

A flaw allowing an attacker to bypass a security feature that protects against macros embedded in downloaded documents.

CVE-2024-38217 – Windows Mark of the Web, Security Feature Bypass – CVSS 5.4

The vulnerability allows an attacker to open specially crafted malicious LNK files and bypass Smart App Control and Mark of the Web security warnings and is thought to have been exploited since 2018.

CVE-2024-43491 – Windows Update, Remote Code Execution – CVSS 9.8

Microsoft has not detected any exploitation of this flaw, and the Windows product team is unaware of any previous exploitation, although it is treating it as exploited.

“Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015),” explained Microsoft. “This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024 — KB5035858 (OS Build 10240.20526) or other updates released until August 2024.” The issue can be resolved by installing the September 2024 Servicing stack update (SSU KB5043936) and the September 2024 Windows Security update (KB5043083) in that order.

Ivanti Releases Patches for Several Critical Endpoint Manager Flaws

Ivanti has fixed several critical and high-severity flaws in its Endpoint Manager (EPM) software, including one maximum severity flaw. The endpoint management software is used by IT professionals to manage and secure endpoints, including desktops, laptops, servers, and mobile running various operating systems.

The maximum severity vulnerability is tracked as CVE-2024-29847 and is due to a flaw in the deserialization of data in its agent portal. Successful exploitation of the flaw would allow a remote attacker to execute code on the core server. Ivanti has also patched 9 other critical flaws each with a CVSS severity score of 9.1 (CVE-2024-32840, CVE-2024-32842, CVE-2024-32843, CVE-2024-32845, CVE-2024-32846, CVE-2024-32848, CVE-2024-34779, CVE-2024-34783, and CVE-2024-34785), two high severity flaws with CVSS scores of 8.2 and 7.8 (CVE-2024-37397 & CVE-2024-8191), and four medium-severity flaws with CVSS scores ranging from 4.3 to 6.7.

None of the vulnerabilities are thought to have been exploited in attacks at the time of patch release; however, hackers have extensively targeted Ivanti flaws in the past so prompt patching is strongly recommended. The vulnerabilities affect EPM versions 2024 and 2022 SU5 and earlier. They have been corrected in Ivanti EPM 2024 hot patches (need to apply both July and September), 2024 SU1 (To be released), and Ivanti EPM 2022 Service Update 6 (SU6).

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist